Class / Patent application number | Description | Number of patent applications / Date published |
379930020 | Access restricting | 88 |
20080247523 | Multiple virtual telephones sharing a single physical address - A shared multi-user IP telephone device for receiving, based on SIP, calls transmitted over VoIP network, a system using such a device and method thereof. The shared multi-user IP telephone device includes a storage device for storing user profiles, an ID extraction portion for receiving from the VoIP network a SIP packet including at least the callee's ID, and extracting the ID contained in the SIP packet, and a personalized feature presentation portion for searching in the storage device for the user profile corresponding to the ID according to the extracted ID for presenting the corresponding personalized feature according to the search result. Thus it is possible for everyone using such a phone to receive directly the call for him/herself without anyone else or other device forwarding the call. | 10-09-2008 |
20080260120 | Evaluating The Use Of Services Accessible From A Terminal - To evaluate the use of services accessible from a user terminal via a telecommunication network, an authentication sever authenticates the user of the terminal and transmits identifiers of the services to a control device to authorize the user terminal to access the services. In response to the service identifiers triggering an opening of control sessions for accessible services from the user terminal, an evaluation module evaluates the data traffics exchanged between the user terminal and service servers dispensing the services accessible in traffic accounts, and transmits to a management server, service control messages each including a service identifier and a traffic account relating to an accessible service after the closure of control sessions relating to the services. | 10-23-2008 |
20090016500 | Methods, Systems, and Products for Caller Control of Internet Call Waiting - Caller Control of Internet Call Waiting (ICW) Services are provided to disconnect a data connection and to prevent establishment of a subsequent data connection. An incoming communication to a called number is received and includes an interrupt code to disconnect a data connection associated with the called number. If the interrupt code is valid, the data connection is disconnected, and a subsequent data connection is prevented until an authorization code is received that permits enablement of the subsequent data connection. | 01-15-2009 |
20090154671 | COMMUNICATION SYSTEM AND METHOD - A communication system is disclosed which is arranged to cause establishment of a connection between a first system that is a party to a call, or is a party to a call being initiated, and a second system. The first and second systems are arranged to communicate via said connection. The communication comprises a data dialogue that is separate to initiation communications for the call. At least one of the first system and the second system is arranged to store data, or to cause a change to an application or data or process in dependence on the data dialogue. A corresponding method is also disclosed. | 06-18-2009 |
20090175426 | METHODS, SYSTEMS AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING ACCESS TO PERSONAL PROFILES IN COMMUNICATIONS SYSTEMS - Methods of switching personas associated with an asserted identity by determining a selected persona based on at least one of a sequence of digits entered during initiation of a call are provided. The at least one of the sequence of digits indicates a request for a persona associated with an asserted identity. It is indicated that an original persona associated with the asserted identity should be switched to the selected persona associated with the asserted identity if it is determined that the original persona and the selected persona are different. Related systems and computer program products are provided. | 07-09-2009 |
20090238349 | Intelligent Network Providing Network Access Services (INP-NAS) - An open Information Services network architecture is disclosed which enables multiple business entities to assume specialized roles of access provider, service provider, and service retailer. The disclosed technology provides instant plug-and-play service, decouples access and service networks and provides seamless (single step) access enabling customers to maintain a service account regardless of location. The benefits of the disclosed technology, among others, include: Multi-level and multi-service registration; Broker Services providing customers with a choice of provider; Security Services relating to distribution; Revenue Assurance services, Gentle Reminder/Gentle Touch; Revenue Assurance services pertaining to usage integrity verification upon registration; mobile services derived from G-ISN; and claim benefits pertaining to LNP services derived from G-ISN. | 09-24-2009 |
20090238350 | COMMUNICATION SYSTEM FOR DETERMINING COMMUNICATION RELAY DESTINATION, APPARATUS FOR NOTIFYING RELAY DESTINATION INFORMATION, AND IP PHONE TERMINAL - A receiving unit receives state information including operational state of an IP phone terminal, user ID, and destination ID, and stores it in a state storage unit. An obtaining unit obtains state information including a user ID included in received state information from the state storage unit. A determining unit determines an order for selecting a second destination ID as a relay destination of a communication for a first destination ID based on the operational state. A generating unit generates order information indicating a selection of the second destination ID in a determined order. A notifying unit notifies the order information to a server device. | 09-24-2009 |
20090252309 | SYSTEM AND METHOD FOR AUTHENTICATING A COMMUNICATION DEVICE - A system that incorporates teachings of the present disclosure may include, for example, a communication device having a controller to transmit to a communication system a PKI certificate, and engage in encrypted communications responsive to receiving a public key from the communication system. The communication system can have a plurality of network elements that integrate operations of a circuit-switched communication network and a packet-switched communication network. Other embodiments are disclosed. | 10-08-2009 |
20090257569 | METHOD AND SYSTEM FOR PROVIDING GOODS OR SERVICES TO A SUBSCRIBER OF A COMMUNICATIONS NETWORK - A method for providing goods or services to a subscriber of a communications network, the method including the steps of: (a) verifying ( | 10-15-2009 |
20090257570 | System and Method for Accessing a Messaging Service Using a Short Dialing Sequence - A system and method for providing easy access to messaging services in a telecommunications network having office switches that are used by different providers of telephone and messaging services. The system uses a supplementary services database to maintain customer records including whether the customer uses messaging services and whether the customer subscribes to a short dialing sequence service for access to the messaging services. The customer is connected to the central office switch, which analyzes the dialing sequences generated by the customer. When the customer attempts access to the messaging services, the customer dials a short dialing or message sequence, such as *XX. The central office switch triggers a query to the supplementary services database for a call forwarding number to the messaging service used by the customer when the selected short dialing sequence is recognized by the switch. When the central office switch receives the call forwarding number, the number is used to route the customer to the messaging service. | 10-15-2009 |
20090274281 | METHOD AND SYSTEM FOR PROVIDING COMMUNICATION CONTROL FUNCTIONALITY AT A REMOTELY LOCATED SITE USING A DISTRIBUTED FEATURE ARCHITECTURE - A method for providing communication control functionality at a remotely located site using a distributed feature architecture which provides communication features and data records to an Enhanced Network User (ENU). The ENU connects to a Distributed Feature Network (DFN) in order to gain access to communications features contained in the DFN. Based on the type of communication requested, one or more feature boxes are created in order to implement the requested communication. | 11-05-2009 |
20090279677 | METHOD AND SYSTEM TO PREVENT UNINTENDED USERS FROM ACCESSING A RE-ROUTED COMMUNICATION - A method, system, and computer-readable medium embodying a computer program for securing a communication against access by unintended users is presented. A communication is initiated from a person using an originating telecommunication device to an intended receiving wireless telecommunication device. In response to the communication failing to connect to the intended receiving wireless telecommunication device, a telecommunications host carrier provider may re-route the communication to an alternate telecommunication device. A business authentication logic of the host carrier then determines any security or quality of service filters established by the user of the originating telecommunication device prior to the communication being initiated to prevent unintended users from accessing the communication. Upon the business authentication logic of the host carrier authorizing the communication, the communication is encrypted and re-routed to the alternate telecommunication device. Upon receipt, the user of the alternate telecommunication device may then decrypt and access the secured communication. | 11-12-2009 |
20090290695 | Network Telephony Appliance and System for Inter/Intranet Telephony - A network appliance ( | 11-26-2009 |
20090304162 | USER AUTHENTICATING METHOD, USER AUTHENTICATING SYSTEM, USER AUTHENTICATING DEVICE AND USER AUTHENTICATING PROGRAM - To reduce the operations required by a user to perform user authentication using the user's communication apparatus, a call module ( | 12-10-2009 |
20100040210 | METHOD AND SYSTEM FOR AUTOMATED USER AUTHENTICATION - A method and system for authenticating a telephone number. The method includes receiving a user-inputted telephone number over a communication channel. The method includes providing a security code to a user over the communication channel. The method includes initiating a voice telephone call session to the user-inputted telephone number. The method includes prompting the user over the voice telephone call session. The method includes responsive to receiving the security code from the user over the voice telephone call session, authenticating the user-inputted telephone number. | 02-18-2010 |
20100091961 | System and Method to Identify Customer Premises Equipment Devices - A computer implemented method includes sending a request from a customer service terminal to a broadband remote access server to retrieve a device identifier of a customer premises equipment device. The device identifier is received by the broadband remote access server via a point to point protocol over ethernet active discovery initiation packet sent from the customer premises equipment device. The computer implemented method includes receiving, at the customer service terminal, a response from the broadband remote access server that includes the device identifier of the customer premises equipment device. | 04-15-2010 |
20100111271 | SELECTIVE FACSIMILE DENIAL - A system includes a switch responsive to a control module. The control module that determines whether an incoming telephone call from a telephone number to a telephone line is a facsimile call or a voice call and whether facsimile calls are authorized to be routed to the telephone line. When the incoming telephone call is a voice call, the control module instructs a switch to route the incoming telephone call to the telephone line. When the incoming telephone call is a voice call, the control module instructs the switch to route the incoming telephone call to the telephone line when facsimile calls are authorized, and to deny routing the incoming telephone call to the telephone line when facsimile calls are not authorized. | 05-06-2010 |
20100183130 | Cybercrime detecting and preventing method and system establisheed by telephone number code, authorization codes and source identification code - A cybercrime detecting and preventing method and system authorization code includes a cybercrime detecting and preventing website, an interface dynamic web page, a detecting search program, and a checking comparison database. When a network user inputs a “telephone number code” and “authorization code” of a network server using an internet accessing device, the user is also required to input a “source identification code.” When access to a network receiver or server is requested, a “telephone number code and authorization code” set is input to the website for comparison with “telephone number codes” and “authorization codes” stored in the checking comparison database. If the input “telephone number code and authorization code” set does not match a “telephone number code and authorization code” set previously registered and stored in the database, the “source identification code” is transmitted to a cybercrime detecting and preventing computer to be analyzed and determine the location of the cybercriminal and relay information on the cybercrime to an appropriate public security organization so that network fraud can be avoided and a secure network usage environment created. | 07-22-2010 |
20100215159 | SECURE FEATURE ACCESS FROM AN OFF-PBX TELEPHONE - A security plan for telephone clients allows the client to authenticate itself by sending a coded sequence of DTMF digits to a PBX at the beginning of each call. When the idle client telephone receives a call, it sends a coded DTMF sequence to the PBX. If the client makes a feature invoking call to the PBX while active on the first call, the client will be prompted for the security sequence. The client must send the same sequence of DTMF digits as for the first call. The first call is authenticated by virtue of being a call from the PBX to the telephone. The second call is authenticated by sending a DTMF sequence that matches the one sent with the first call. A call that fails authentication is dropped. The security plan for clients constrains the client to using a callback to originate a call from an idle telephone. | 08-26-2010 |
20100215160 | CALL MANAGEMENT SYSTEMS AND METHODS - Call management systems and methods are provided. The call management system includes a touch-sensitive display unit, and a processing unit. The touch-sensitive display unit displays data including at least a body and a phone number, and receives a selection corresponding to the phone number. In response to the selection corresponding to the phone number, the processing unit automatically dials according to the phone number, and displays the body of the data during dialing via the touch-sensitive display unit. | 08-26-2010 |
20100239077 | MULTIMEDIA COMMUNICATION SESSION COORDINATION ACROSS HETEROGENEOUS TRANSPORT NETWORKS - The present invention, in one embodiment, is directed to the use of a communication pathway traversing a digital telephone network to handle a portion of the signaling traffic associated with a communication method performed over the Internet. | 09-23-2010 |
20100260326 | Short Impromptu Communications In Presence-Based Systems - An apparatus and methods are disclosed for enabling certain types of communications to occur, even when presence information might indicate that a particular user is unavailable. In the illustrative embodiment, a first user submits a request to communicate with a second user, where the request specifies a maximum time duration for the communication, and optionally: a minimum time duration, an expected time duration, a priority, a subject, and a type of communication. A presence server receives the request and decides whether the request should be granted based on the information specified in the request, and one or both of: presence information for the second user, and the contents of a calendar. The illustrative embodiment is also capable of detecting inconsistencies between calendars and presence information, as well as events that might affect a user's presence or indicate a departure from scheduled activities. | 10-14-2010 |
20100316202 | METHOD AND APPARATUS FOR NEW SUBSCRIBER ACCESS TO TELEPHONY FEATURES - A method and apparatus for gaining access to communication services includes receiving an initial inquiry for communication service access, collecting equipment information based upon the initial inquiry, sending a non-voice communication to said equipment and receiving a request from said equipment to obtain communication service access. The apparatus includes a system having one or more controllers for performing communication service access. | 12-16-2010 |
20100322398 | Method and Apparatus for Exchanging Information in a Voice Communication System - The present invention provides a method for exchanging information in a voice communication system, which includes a first communication device establishing a communication connection with a second communication device, and the first communication device exchanging digital data with the second communication device for achieving a specific function in a specific interval; wherein the specific interval is an interval that the first communication device does not exchange voice signals with the second communication device. | 12-23-2010 |
20110044438 | Shareable Applications On Telecommunications Devices - During voice communication between multiple telecommunications devices, a shareable application facilitates concurrent sharing of data and processes between the devices. The application may be configured to monitor the voice communication and execute a predetermined function upon detecting a predetermined condition in the voice communication. The application may further facilitate sharing of functionality and user interface displays during the voice communication. In some implementations, a server computing device on a communications network may facilitate functions of shareable applications on one or more telecommunications devices. | 02-24-2011 |
20110044439 | METHODS AND APPARATUS FOR AUTHORIZATION AND/OR ROUTING OF OUTDIAL COMMUNICATION SERVICES - Methods and apparatus for authorization and routing of outdial communication services are disclosed. An example method disclosed herein comprises receiving a request to authorize an outdial communication service call initiated by a message center, and accessing an authorization table to determine whether the outdial communication service call is authorized, the authorization table to correlate input criteria associated with the request to an authorization result for the outdial communication service call, the input criteria comprising a first criterion indicating whether the outdial communication service call is for a real-time outdial service initiated in response to an indial communication service received at the message center, or for a non-real-time outdial service initiated by an application server associated with the message center. | 02-24-2011 |
20110051912 | Secure Key Management in Conferencing System - Principles of the invention provide one or more secure key management protocols for use in a communication environment such as a conferencing system. For example, a method for managing a conference between two or more parties in a communication system comprises the following steps. An identity based authenticated key exchange operation is performed between a conference management element of the communication system and each of the two or more parties seeking to participate in the conference, wherein messages exchanged between the conference management element and the two or more parties are encrypted based on respective identities of recipients of the messages, and further wherein the conference management element receives from each party during the key authentication operation a random key component that is computed based on a random number selected by the party. The conference management element sends to each party a set comprising the random key components computed by the parties. The conference management element receives from each party a random group key component, wherein the random group key component is computed by each party via a computation based on the random number used by the party during the key authentication operation and the random key components computed by a subset of others of the two or more parties seeking to participate in the conference. The conference management element sends to each party a set comprising the random group key components computed by the parties such that each party can compute the same group key for use in communicating with each other party through the conference management element. | 03-03-2011 |
20110051913 | Method and System for Consolidating Communication - A method and system are described for collating all avenues of communication through a single source. A user provides communication information to a service provider. The service provider associates this communication information with an identification code. The user then provides the identification code to new contacts instead of the user's communication information. When the contact tries to communicate with the user, the identification code directs the contact to the service provider. The service provider checks to see if the contact is permitted to communicate with the user. If permission is granted, the service provider routes the communication to the user, preferably in a format specified by the user. | 03-03-2011 |
20110064208 | Service Interfacing for Telephony - During a telephone call between a telephone user and an interactive response system, the user is enabled to use only his voice and key presses on a numeric keypad of his telephone to interactively specify information that can be used to control delivery of content to a visual display of, or a storage medium accessible by, a target telephone which may be a land-line phone, a mobile phone, or some other device acting as a telecommunications device. The target telephone has a visual display or a memory to display or store the delivered content, which may include ringtones, text messages, games, wallpapers, ring-back tones, video clips, web pages, applications, or links to information. The user is enabled to engage in an interaction with the response system that is representative of an interaction between the user and a server connected to the Internet. On behalf of the user, a separate interaction is conducted with the server through the Internet based on the representative interaction. Information is received that can be used to identify the user and the target device. Based on the received information, user authentication information is transmitted to the user, the authentication information is received from the user, and the user is allowed to access a service. | 03-17-2011 |
20110091025 | Service Entry Device - A system is described in which, in some embodiments, a centralized service entry device may be used to coordinate communications going into and out of a home or premises. The service entry device may be physically connected to a plurality of external access networks, such as a cable television coaxial or fiber connection and a twisted-pair wire connection, and may coordinate access to those networks by a plurality of in-home devices. Within the home, the system may include a plurality of client devices to assist in the coordination of communications with devices in different rooms within the home. | 04-21-2011 |
20110103561 | Dynamic Modem Bandwidth Checking - Methods, systems, devices, and software are disclosed for providing controlled access to network characteristic data stored at a subscriber premises. In one embodiment, Internet services are provided to a subscriber through a subscriber's modem, connected to the Internet through an access network, and to a number of data terminals on a local network. The modem is adapted to receive and/or generate data from the connected networks and devices for use in generating network characteristic data. This data is stored in an access-controlled data storage module. Content providers may then login to the modem and query network characteristic data. The modem is configured to authenticate the content provider, and, if authorized and available, return the queried data to the content provider. The content provider may then communicate information to the subscriber's data terminal through the modem, according to the network characteristic data returned by the query. | 05-05-2011 |
20110110504 | Controlling Communications - A first network comprising: one or more first end-user computer terminals; a gateway to a second, packet-based network comprising one or more second end-user computer terminals installed with a communication client of the second network; one or more telephone units for performing calls with one of the second end-user computer terminals over the second network; wherein each of the one or more first end-user terminals is installed with a communication client for performing calls with the second end-user computer terminals over the second network; and wherein the gateway comprises switching apparatus configured to detect a user selection between a first state in which one of said calls is to be performed using one of said first end-user computer terminals and a second state in which the call is to be performed using one of said telephone units; and on condition of detecting the first state, to route both call set-up signalling and call media to the first end-user computer terminal; and on condition of detecting the second state, to route call set-up signalling to the first end-user terminal but route the call media to the telephone unit. | 05-12-2011 |
20110123008 | Method and apparatus for telecommunication session authentication using DTMF signaling - Method and system for authenticating a telecommunication session request provides the steps of receiving the telecommunication session request, sending an authentication trigger request, receiving at least one authentication character encoded by a DTMF tone that is not capable of being generated via a keypad stroke and performing an authentication operation upon the at least one received authentication character. In one embodiment of the invention, the at least one authentication character is a string of authentication characters. The string may further include a first non-numeric DTMF tone (indicative of the beginning of the string of authentication characters), one or more alpha-numeric DTMF tones and a second non-numeric DTMF tone (indicative of the end of the string of authentication characters). Additional information may also be appended to the at least one authentication character during the receiving step (i.e., callerID information or a destination number for the telecommunication session). | 05-26-2011 |
20110135073 | METHODS TO IMPROVE FRAUD DETECTION ON CONFERENCE CALLING SYSTEMS BY DETECTION OF CONFERENCE MODERATOR PASSWORD UTILIZATION FROM A NON-AUTHORIZED DEVICE - An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. An authorized device registry is created in an electronic database, wherein the authorized device registry identifies one or more authorized devices permitted to access the conference calling system. A request to access the conference calling system is received from a device; and, a processor determines whether the device is included in the authorized device registry. If the device is included in the authorized device registry, the device is granted access to the conference calling system. If the device is not included in the authorized device registry, however, are performed by the processor. | 06-09-2011 |
20110135074 | SYSTEM AND METHOD FOR PROVIDING MULTI-PROVIDER TELECOMMUNICATIONS SERVICES OVER A PASSIVE OPTICAL NETWORK - A method for providing access to a passive optical network for services to homes or businesses from two or more telecommunications service providers and a billing means is described. A first service provider connects to a point of presence at one side of passive optical network. The provider transmits the appropriate services through this network to an authorization receiver. The authorization receiver is used to receive a periodic authorization code from the network provider to enable the appropriate services from the service provider to be transmitted to a subscriber at a home or business. The authorization receiver enables an optical fiber path to be established for the services to flow to and from the home or business. The authorization code that is transmitted through the network also provides an unambiguous means to provide a billing record such that the service provider can be billed by the network provider on an individual service address connected basis in conjunction with a record of houses passed and not yet connected. | 06-09-2011 |
20110142212 | METHOD AND APPARATUS FOR PROVIDING SERVICE ORIENTED COMMON ACCESS NETWORK SERVICE - Provided is an access node including: a receiver to receive subscriber information associated with a subscriber from a residential gateway of the subscriber and a service request from the subscriber; a storage unit to store registration information comprising the subscriber information and service information received from a plurality of service providers; and a processor to provide, to the residential gateway, a service corresponding to the service request based on the subscriber information. | 06-16-2011 |
20110142213 | PROFILE MANAGEMENT SYSTEM INCLUDING USER INTERFACE FOR ACCESSING AND MAINTAINING PROFILE DATA OF USER SUBSCRIBED TELEPHONY SERVICES - Subscriber profile data is managed. The subscriber profile data is associated with a communications service subscribed to by a subscriber. A request to retrieve the subscriber profile data is received based upon a client sending a request for the subscriber profile data. The client hosts a user interface configured to allow the subscriber to obtain and update the subscriber profile data. The subscriber profile data is retrieved from the communications network in response to the request to retrieve the subscriber profile data. A request to update the subscriber profile data is received based upon the client sending a request to update the subscriber profile data. An update for the subscriber profile data is forwarded to the communications network based upon receiving the request to update the subscriber profile data. | 06-16-2011 |
20110158393 | COMMUNICATION APPARATUS PERFORMING COMMUNICATION VIA NETWORK USING PHONE NUMBER, CONTROL METHOD FOR THE SAME, AND STORAGE MEDIUM - A communication apparatus that enables to appropriately perform IP filtering even when communication via a network is performed by a user inputting a destination phone number. An IP filter permits or rejects communication on the basis of a set IP address. An input unit inputs a phone number. An acquisition unit acquires an IP address corresponding to the phone number inputted by the input unit from a server connected to the network. A setting unit sets the IP filter so that communication using the IP address acquired by the acquisition unit is permitted. | 06-30-2011 |
20110235790 | Computing Device With Remote Contact Lists - In one implementation a computer-implemented method includes generating a group of telephone contacts for a first user, wherein the generating includes identifying a second user as a contact of the first user based upon a determination that the second user has at least a threshold email-based association with the first user; and adding the identified second user to the group of telephone contacts for the first user. The method further includes receiving a first request to connect a first telephone device associated with the first user to a second telephone device associated with the second user. The method also includes identifying a contact identifier of the second telephone device using the generated group of telephone contacts for the first user, and initiating a connection between the first telephone device and the second telephone device using the identified contact identifier. | 09-29-2011 |
20110243313 | System apparatus and method for accessing scheduling information - A system for accessing scheduling information. In one illustrative embodiment, a user can log into a phone system by entering their extension number and passcode, which allows the phone to assume their profile. The user then enters the credentials required to access their PC based calendar information, which is stored by a server application. The server application can look up the scheduling information that is stored in the user's PC based calendar application on a message server. The information can then be provided to the phone by the server application where it is displayed. Application programming interfaces can facilitate communications between the phone and the server application and the server application and the message server. Other information located on the message server can also be retrieved through the server application and is not limited to scheduling information. | 10-06-2011 |
20110293080 | COMMUNICATION SYSTEM, PROCESSING APPARATUS, AND COMMUNICATION METHOD IN COMMUNICATION SYSTEM - A processing apparatus, including: a query statistics unit which inputs a query request for querying a destination for first telephone number, and counts the number of input query requests; and a restriction control unit which transmits to a restriction control apparatus which performs outgoing call restriction, a restriction request to restrict a telephone call by second telephone number, when the counted number of the query requests is equal to or greater than a restriction start threshold, wherein the telephone call by the second telephone number is restricted by transmission of the restriction request, and a telephone call by the first telephone number is performed. | 12-01-2011 |
20110299672 | System and methods for dynamic integration of a voice application with one or more Web services - A system is provided for leveraging a Web service to provide access to information for telephone users. The system includes a first network service node for hosting the Web service, an information database accessible from the service node, a voice terminal connected to the first service node, and a service adaptor for integrating a voice application executable from the voice terminal to the Web service. In a preferred aspect, the service adaptor subscribes to data published by the Web service and creates code and functional modules based on that data and uses the created components to facilitate creation of a voice application or to update an existing voice application to provide access to and leverage of the Web service to telephone callers. | 12-08-2011 |
20110317822 | COMMUNICATION DEVICE, METHOD OF OPERATING THE SAME, AND COMMUNICATION SYSTEM - A communication device includes a call unit, a transmitter, a network transmission unit and a display unit. The call unit can generate a call request based on a phone number of a phone device of a called party. The transmitter can send the call request to the phone device. The network transmission unit is responsive to the call request for acquiring current status information of the called party from at least one social network server through Internet. The display unit can render the current status information. | 12-29-2011 |
20120027186 | METHOD AND APPARATUS FOR THE SECURE STORAGE OF AUDIO SIGNALS - In one embodiment, a method, system and apparatus for recording audio is provided so that the recording can be authenticated. The system may be implemented as a central server that is accessed via one or more lines for audio communication, or as a stand-alone unit. The system operates by encrypting communicated data (e.g., audio signals), storing the encrypted information, and providing at least one user with a key that can be used to decrypt the stored information. | 02-02-2012 |
20120063577 | CALL STATUS SHARING - In general, techniques are described for sharing information about a client device phone call to enhance other services. In one example, a method includes receiving, at a server device, voice call parameters that describe at least one characteristic of a voice call in which a user of a first device is participating wherein the first device is physically separate from the server device, and responsive to receiving the voice call parameters, determining, by the server device, a status of the user based on the received voice call parameters. The method further includes storing an account for the user on the server device, wherein the account includes a user profile for the user and identifies contacts of the user, and modifying, by the server device, the user profile to reflect the status of the user, and sending the modified user profile to a device associated with a contact of the user. | 03-15-2012 |
20120106719 | System for establishing publicly accessible telephone numbers and methods thereof - This application relates to providing an end user control of temporary numbers established and linked to a trusted phone number using traditional forwarding mechanisms. Temporary phone numbers can be created and assigned to individuals to provide them with a unique point of contact. The temporary numbers are then linked to the individual's private number. The temporary numbers can be shared with individuals and organizations with whom the individual has an interest in communicating with. However, these numbers will often find their way into the hands of third parties with whom the individual has no interest in talking with. When the user simply no longer feels that the numbers are being properly used, the user can remove the temporary numbers linked with their private number so no further calls can be made and routed to their private number. The temporary numbers can be used to uniquely identify the calling party. | 05-03-2012 |
20120106720 | Call authorization feature - A call processing method, system and communication device for providing call authorization features. Generally described, the present application relates to authorizing communications between devices during call setup time. In one illustrative embodiment, communications within a telephone network configured within a private branch exchange or carrier are filtered using an authorizing device. The authorizing device can be activated using different procedures including, but not limited to, feature access codes and pin numbers. When a call is received from a calling device, the telephone network can reserve a line for the call to the intended restricted device. The authorizing device can thereafter be alerted about the call. A user of the authorizing device can answer the call or direct the telephone network to block the call, connect the call with the restricted device through the reserved line, or forward the call to a third device. | 05-03-2012 |
20120140911 | SYSTEMS AND METHODS TO SECURELY COLLECT DATA OVER A TELEPHONE - A computer-implemented method to securely collect data over a telephone is described. Telephone communications between a customer and a customer service representative are monitored. At least one tone from a telephone keypad of the customer is detected. The at least one tone represents sensitive data for the customer. An audio output channel directed to the customer service representative is prevented from outputting a detectable tone from the telephone keypad of the customer. An indicator is provided to the customer service representative when detection of the at least one tone occurs. | 06-07-2012 |
20120148037 | THIS CALL - An in-progress call can be manipulated such that user devices in proximity to the in-progress call, but not initially part of the call, are enabled to join the in-progress call. Determining that a user device is in proximity to an in-progress call may include detection, by the user device, of an in-progress call. Alternatively, or in addition, a communication device involved in the in-progress call may detect a user device and query the user device as to whether it has permissions to join the in-progress call and, if so, whether it wants to join the in-progress call. | 06-14-2012 |
20120155623 | METHOD FOR PROVIDING CUSTOM RING-BACK TONES - A method is provided for providing customized ring-back tones to callers on a wireline network such as a public switched telephone network having an advanced intelligent network or a VoIP network. When a call request is received from a calling party to connect to a called party through a wireline telephone network it is determined if the calling party is identified in a screening list for the called party. If so, then a customized audible ring-back tone is played to the calling party until the called party is connected to the calling party or until the call request is terminated. | 06-21-2012 |
20120163571 | HIGHLY SCALABLE AND DISTRIBUTED CALL/MEDIA MODELING AND CONTROL FRAMEWORK - A highly scalable and distributed call/media modeling and control framework is described. In particular, a plurality of anchor point servers are provided which enable one or more applications to exert call and media control over in-progress communication sessions even though the applications were not originally bound to the communication session during its setup. | 06-28-2012 |
20120170726 | Media Link - Two or more users can be connected over the internet or through the world-wide web or other network without the users exchanging access numbers and/or user identifications. Moreover an instant voice communication channel may be established based on the caller's device identification number or electronic signature without the need to create dedicated telephony paths or user names/passwords. | 07-05-2012 |
20120207292 | AUTHORIZING ACCESS BETWEEN COMMUNICATION NETWORKS - Methods and systems of authorising a user of a first packet-based communication network to access a second packet-based communication network are disclosed. A call setup request is received from a user terminal of the user at a first network element of the first packet-based communication network, the authorisation request comprising a first user identity. Responsive to the call setup request, a request is transmitted to create a second user identity from the first network element to a second network element of the second packet-based communication network. The second network element creates the second user identity for use in the second packet-based communication network. The second user identity is derivable from the first user identity according to a predetermined rule. The second user identity is stored in the second packet-based communication network for use with establishing a call associated with the call setup request over the second packet-based communication network. | 08-16-2012 |
20120213347 | SYSTEM AND METHOD FOR PROVIDING TELEPHONY SERVICES - In certain embodiments, the present invention comprises a system and method for providing feature services in a multimedia communication environment. The system and method comprise comparing signaling messages with control data to identify one or more service enablers and application servers that are responsive to the signaling message. Each responsive service enabler is invoked in accordance with an associated policy hook. | 08-23-2012 |
20120213348 | ENHANCING MESSAGING SERVICES USING TRANSLATION GATEWAYS - In one embodiment, a translation gateway is for use between a network of a messaging service provider and a hostile data network. The gateway is to forward messages using a secure connection through the hostile network, to a customer's network. Different types of inbound messages (e.g., voice; fax) can be delivered to a single client process running on a customer machine on the customer network. In addition, the translation gateway may be used to securely forward different types of outbound messages originating from the client process to the service provider's network (where the messages are retransmitted as voice calls or facsimiles into a telephone network). Other embodiments are also described and claimed. | 08-23-2012 |
20120230480 | METHOD FOR SELECTION AND ROUTING OF AN OUTBOUND VOICE CALL TO AN APPROPRIATE NETWORK FOR COMPLETION - The disclosed embodiments include a method of initiating a call. The method includes receiving, at a network device over a first network, an identifier associated with a called party. The method determines a first security level associated with the first network and identifies a plurality of networks associated with the called party using the identifier. The method queries a database to determine a second security level for each network in the plurality of networks and automatically selects an identified network from the plurality of networks associated with the called party having the second security level at least equal to the first security level. The method completes a call to the called party using the identified network. | 09-13-2012 |
20120307991 | Intelligent Telephone Number Processing - A method and apparatus of a device that converts a telephone number based on the location of a telephone is described. The device receives the telephone number, where telephone number is to be used to place a telephone call on the device. The device further determines if the telephone number is suitable to place the telephone call based on a content of the telephone number and a location of the device. If the telephone number is not suitable to place the telephone call, the device converts the telephone number to a telephone number suitable to be used to place the telephone call. | 12-06-2012 |
20120307992 | METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING DYNAMIC REPLACEMENT COMMUNICATION IDENTIFICATION SERVICE - Methods, apparatus, and computer program products provide dynamic replacement communication identification (ID) service. A request is received from a user for dynamic replacement communication ID from a current location of the user. The user requesting dynamic replacement communication ID is authenticated. A user profile of the user requesting dynamic replacement communication ID is retrieved. A current profile of the current location is replaced with the user profile of the user. | 12-06-2012 |
20130003950 | SECURITY KEY CREATION - A device may obtain calling security parameters, may communicate the calling security parameters to a network device, and may receive, from the network device, a calling parameters identifier associated with the calling security parameters. The device may communicate the calling parameters identifier to a called device, may receive a called parameters identifier from the called device, and may communicate the called parameters identifier to the network device. The device may receive called security parameters from the network device, may create a security key based on the calling security parameters and the called security parameters, and may communicate with the called device using the security key. | 01-03-2013 |
20130010940 | METHOD AND SYSTEM FOR PROVIDING COMMUNICATION CONTROL FUNCTIONALITY AT A REMOTELY LOCATED SITE USING A DISTRIBUTED FEATURE ARCHITECTURE - A method for providing communication control functionality at a remotely located site using a distributed feature architecture which provides communication features and data records to an Enhanced Network User (ENU). The ENU connects to a Distributed Feature Network (DFN) in order to gain access to communications features contained in the DFN. Based on the type of communication requested, one or more feature boxes are created in order to implement the requested communication. | 01-10-2013 |
20130077774 | TEMPORAL INCOMING COMMUNICATION NOTIFICATION MANAGEMENT - Smart phone computer app. The method may include, if a number of an incoming phone call or incoming text message is not temporally allowed, not allowing for notification of the incoming phone call or incoming text according to a normal notification routine and generating a notification of the incoming call or incoming text according to a password-protected masked notification routine of the smart phone, wherein the password-protected masked notification routine of the smart phone includes adding an indication of the incoming phone call or incoming text message to a password-protected phone log or message log of the smart phone and precludes immediately displaying the incoming phone call or incoming text message information on a display of the smart phone, and further precludes adding an indication of the incoming phone call or incoming text message to a default phone log or message log of the smart phone. | 03-28-2013 |
20130083908 | System to Deploy a Disaster-Proof Geographically-Distributed Call Center - A redundant Session Initiation Protocol (SIP) call center system has two data centers each having a first and a second SIP server cooperating as a first SIP-server high availability (HA) pair, a set of SW applications executable at each data center, and a plurality of agent stations each comprising a SIP telephone and a computerized appliance executing a desktop application at each agent station. The HA pairs operate as SIP server peers, the agent SIP phones are configured to maintain simultaneous registration with both SIP server peers, and Agent Desktop applications log in to only one SIP server peer, wherein the SIP Server peers collaborate to deliver calls to individual agent SIP phones via the SIP server peer where the agent is logged in, and wherein, upon failure of either data center agent's desktop applications log in to the other data center, allowing the associated agent to continue working. | 04-04-2013 |
20130089191 | METHODS, SYSTEMS, AND DEVICES FOR PROVIDING VOICE-CALL SERVICES RESPONSIVE TO A DIALED SEQUENCE - A connection is established in a communications network responsive to receiving a Dual Tone Multi-Frequency (DTMF) signal at a port having an assigned sequence associated therewith. A dialed sequence corresponding to the received DTMF signal is identified. If the dialed sequence is associated with a request for a specified service, first and second fields of a packet-switched signaling protocol message are populated with the assigned sequence associated with the port. The populated packet-switched signaling protocol message is transmitted over a packet-switched network to request the specified service, and a connection is established to provide the specified service through the port. Related systems and devices are also discussed. | 04-11-2013 |
20130101099 | Method and apparatus for telecommunication session authentication using DTMF signaling - Method and system for authenticating a telecommunication session request provides the steps of receiving the telecommunication session request, sending an authentication trigger request, receiving at least one authentication character encoded by a DTMF tone that is not capable of being generated via a keypad stroke and performing an authentication operation upon the at least one received authentication character. In one embodiment of the invention, the at least one authentication character is a string of authentication characters. The string may further include a first non-numeric DTMF tone (indicative of the beginning of the string of authentication characters), one or more alpha-numeric DTMF tones and a second non-numeric DTMF tone (indicative of the end of the string of authentication characters). Additional information may also be appended to the at least one authentication character during the receiving step (i.e., callerID information or a destination number for the telecommunication session). | 04-25-2013 |
20130156174 | SYSTEM AND METHOD FOR PROVIDING TELEPHONE NUMBER RELATED INFORMATION, AND PROGRAM PRODUCT THEREOF - A system for introducing telephone number related information, a method for introducing telephone number related information and a program product using the system and method are disclosed. An electronic communication device transmits a telephone number to a remote system for introducing telephone number related information when dialing or receiving a call, and the system searches the telephone number related information from a database stored in the system and provides the information to the electronic communication device, such that the electronic communication device can display the related information corresponding to the telephone number to let users know about the telephone number related information before receiving or dialing a call. | 06-20-2013 |
20130195261 | METHOD AND APPARATUS FOR MANAGING CONTACT BOOKS - A system that incorporates teachings of the present disclosure may include, for example, a system having a controller to receive from a first communication device (CD) a telephone number of a second CD, submit a verification code to the second CD, submit a request to the first CD for the verification code, receive the verification code from the first CD, provide the first CD access to update in whole or in part a second contact book of the second CD stored in a contact book account, receive from the first CD one or more entries of a first contact book of the first CD, merge the one or more entries of the first contact book with one or more entries of the second contact book, thereby generating an updated second contact book, and store the updated second contact book in the contact book account. Additional embodiments are disclosed. | 08-01-2013 |
20130251125 | MANAGING MULTIPLE PASSCODES RELATED TO A SINGLE CALL-IN NUMBER USED BY A PHONE DEVICE - An embodiment of the invention is used with a conference calling system that includes a plurality of client phones, and a conference call center. Passcodes are entered into a list contained in a given client phone, wherein all listed passcodes are associated with a specified phone number that can be used to establish a connection between the given client phone and the conference call center. The specified phone number is used at the given client phone to access the passcode list. A passcode is selected from the list for transmission from the given client phone to the conference call center, over the phone connection established using the specified phone number. In response to receiving the selected passcode at the conference call center, the conference call center is operated to connect the given client phone into a conference call with one or more other client phones. | 09-26-2013 |
20130329874 | CALL-IN NUMBER FORMATTING ADJUSTMENT PER VIEWING DEVICE - Systems and methods for initiating a telephone call on a communication device receive, into a computerized device, an instruction to connect a communication device to a communication receiver using a call-in string comprising a call-in number and a pass code. The call-in string is parsed to separate the call-in number and the pass code, using the computerized device. A pause indicator is identified in the call-in string, using the computerized device. The pause indicator is formatted to a type-specific format appropriate for the type of communication device, using the computerized device. The call-in number is transmitted from the computerized device to the communication receiver. A pause is executed, using the computerized device, according to the pause indicator formatted for a specific type of device. The pass code is transmitted from the computerized device to the communication receiver. | 12-12-2013 |
20140003590 | Identifying Information Associated with an Incoming Telephone Call | 01-02-2014 |
20140086397 | Phone Call Management - An approach is provided to manage phone calls. The approach is implemented by an information handling system, such as a smart phone. A requestor sends a contact request to another device over a network. If the request is accepted, the requestor receives a token with the token including usage parameters controlling the requestor's ability to contact the recipient by telephone. When the requestor requests to make a call to the recipient, the call is only placed upon successful determination made by comparing the usage parameters included in the token to a set of current call data. If a successful determination is made, the call is placed to the recipient without revealing the recipient's telephone number. However, if the request is denied, the system prevents the requestor for placing a call to the recipient. | 03-27-2014 |
20140133638 | Seamless Call Transfer - Techniques for providing for a seamless call transfer in a virtual desktop environment are supported. An apparatus may be capable of requesting access to a remote computer system for registration with a call manager, determining whether a call associated with the apparatus is active, automatically initiating suspension of the call in response to determining that the call is active and requesting registration of a telephone associated with the call, and resuming the suspended call. The seamless call transfer system may result in a more favorable calling experience during authentication with a virtual desktop environment and registration with a call manager. | 05-15-2014 |
20140192968 | SELECTIVE FACSIMILE DENIAL - A method includes determining, at a processor of a computing device, whether an incoming transmission to a first destination is authorized at an electronic device of a communication network. The method includes, in response to determining that the incoming transmission is not authorized, determining whether a particular type of content is communicated via the incoming transmission. The incoming transmission is routed to the first destination when the particular type of content is not communicated via the incoming transmission, and the incoming transmission is not routed to the first destination when the particular type of content is communicated via the incoming transmission. | 07-10-2014 |
20140270121 | METHOD FOR APPARATUS FOR ROUTING APPLICATION PROGRAMMING INTERFACE (API) CALLS - A method and apparatus for routing Application Programming Interface (API) calls from a partner entity to a telephony service provider (TSP) network are provided herein. In some embodiments, a method for routing API calls may include receiving a first message including an API call and a partner API key used to authenticate the partner entity on the TSP network to access a partner API layer disposed on the TSP network, extracting the partner API key from the first message, performing an authentication process to authenticate an identity of the partner entity using at least the extracted partner API key, and routing the first message based on results of the authentication process. In some embodiments, the first message is routed to the partner API layer disposed on the TSP network when the identity of the partner entity is authenticated. | 09-18-2014 |
20150071421 | Message Routing - Methods, devices, signals, and systems are provided in a message routing architecture which provides improved capabilities for integrating “digital” communication through email messages with “analog” communication through voice and/or fax or pager messages. Email can be addressed using nothing more than a standard telephone or fax number. If the registered owner of the telephone or fax number has a corresponding email address, then the invention converts the telephone or fax number to the email address for delivery and uses standard email delivery systems to deliver the message. If no conventional delivery email address is known, or if the message sender or recipient specify multiple delivery modes, then the email message content is transformed into voice, pager and/or fax content and delivered to the recipient using the telephone or fax number which was specified as the email address. Familiar telecommunications services such as call forwarding and selective call blocking can also be used with messages that originate as email. The invention also supports use of telecommunications numbers as indexes into databases which contain public key certificates, to make it unnecessary for a proposed message recipient to provide its public key expressly in advance to each particular proposed message originator. | 03-12-2015 |
20160142551 | Message Routing - Methods, devices, signals, and systems are provided in a message routing architecture which provides improved capabilities for integrating “digital” communication through email messages with “analog” communication through voice and/or fax or pager messages. Email can be addressed using nothing more than a standard telephone or fax number. If the registered owner of the telephone or fax number has a corresponding email address, then the invention converts the telephone or fax number to the email address for delivery and uses standard email delivery systems to deliver the message. If no conventional delivery email address is known, or if the message sender or recipient specify multiple delivery modes, then the email message content is transformed into voice, pager and/or fax content and delivered to the recipient using the telephone or fax number which was specified as the email address. Familiar telecommunications services such as call forwarding and selective call blocking can also be used with messages that originate as email. The invention also supports use of telecommunications numbers as indexes into databases which contain public key certificates, to make it unnecessary for a proposed message recipient to provide its public key expressly in advance to each particular proposed message originator. | 05-19-2016 |
379930030 | Personal identification | 13 |
20080232563 | Account administration system and method with security function - An account administration system and method with security function are provided. The system comprises an identification unit, an issue unit, a portable communication device, and a identification device, wherein after the issue unit receiving the request massage from the portable communication device, a user password will be generated from the issue unit, and the user password will be sent to the portable communication device and the identification unit, thus, user can input the user password to the identification device received from the portable communication device, furthermore, according to the user account used, the identification procedure of the identification unit will exam to be passed for the identification device, such that the online access with the identification unit will be achieved. | 09-25-2008 |
20090028307 | Customizing Called Number Identification - Described herein are systems and methods that enable users to configure, customize, or personalize names for called number identification information. Accordingly, when such information is displayed for an incoming phone call, a user is able to quickly determine which line is being called based on a better user-created description of the CNI information. | 01-29-2009 |
20090086939 | Method for presenting additional information about a telecommunication user - A method and system for presenting additional information about a user are provided. The user may be a calling party or a called party. A request for information in addition to the information normally contained in the caller ID may be constructed and sent to a repository of additional information that returns the additional information. If the user is a calling party, the additional information may be presented on the called party's communication device. If the user is a called party, the additional information may be presented on the calling party's communication device. A system including the repository may receive the request. An authoring and editing component of the system may allow the user or others to edit the additional information about the user. The system may select and send the additional information based on a set of parameters in the request and the access type of the requestor. | 04-02-2009 |
20090110160 | Method of conducting secure transactions over a telecommunications system and Session Initiation Protocol (SIP) based input echo display control for conducting secure transactions - A method of managing a communications network, managing secure transactions conducted by digital communications devices over a communications network and computer program product therefore. A Back to Back User Agent (B | 04-30-2009 |
20090220060 | Phone and pin - 1.1. Phone and PIN enables any unmodified telephone to act as a secure PIN (Personal Identification Number) entry means any remote Computer or Business Information System can use to authenticate the identity of any person or to obtain validation for any transaction purportedly made by any person. | 09-03-2009 |
20100008481 | SYSTEM AND METHOD FOR CERTIFYING AND AUTHENTICATING CORRESPONDENCE (II) - A system and method are provided to monitor and control electronic communications. A processor is in operable communication with processor readable media, and a user interface is provided by the processor over a communication network that is operable to send, receive and report communications from a plurality of users. A database is provided on the processor readable media and accessible by the processor. A centralized messaging center is operable to receive from the processor the communications, to print the communications, to image the communications and to store the communications in a database. | 01-14-2010 |
20100119047 | TELECOMMUNICATION REDIRECT SYSTEM AND METHOD - Provided is a method that includes receiving a redirect request from one or more switches of a telecommunications network, receiving, from one or more switches of the telecommunications network, a connect request that requests connection of a transmitter device to a receiver device associated with the normal subscriber number, and configuring the telecommunication network to connect the transmitter device to a receiver device associated with the modified subscriber number, independently of the switch serving the normal receiver device being operable or inoperable. The redirect request comprises a normal subscriber number and a modified subscriber number. | 05-13-2010 |
20100278322 | USER-BASED AUTHENTICATION FOR REALTIME COMMUNICATIONS - Architecture for a communications system enabling a user to provision a telephone at a new location without network administrative pre-configuring. An input component (e.g., keypad) receives a numeric extension and PIN. The extension is a telephone extension of the user and the PIN can be administratively assigned. A location component provides location information of an enterprise communications server to the telephone based on the extension. The telephone uses the location information to send messages to the enterprise communications server. A registration component registers the telephone with the enterprise communications server based on the numeric extension. A telephony address is returned to the telephone. An authentication component authenticates the telephone based on the PIN. Upon authentication, the extension is assigned to the telephone, and telephone communications can be sent and received from that location. | 11-04-2010 |
20100303216 | Authenticating A User Based On The User's Ability To Distinguish Type-A From Type-B Sounds - A method of authentication is disclosed. When a user registers with an enterprise, the enterprise instructs the user to select sounds from a selection of sounds. Any sound that the user selects is designated as a “type-A” sound and any sound that is not so designated is deemed a “type-B” sound. To authenticate the user, the enterprise combines type-A sounds and type-B sounds into a temporal series of sounds and constructs questions about the series that can only be answered by someone who can recognize and distinguish type-A sounds from type-B sounds. The series of sounds and the questions are then transmitted to the user. If the user is able to answer the questions, then he or she is authenticated, and if not, then he or she is not authenticated. | 12-02-2010 |
20110044440 | SENDING A USER ASSOCIATED TELECOMMUNICATION ADDRESS - One or more participants in a communication are authenticated using an authentication metric such as a face print or voice print. A single telecommunication address (or one for each participant) that is not associated with a communication device and is associated with at least one of the participants is determined. The telecommunication address (or addresses) is sent during the initiation of a communication session. | 02-24-2011 |
20110274259 | METHOD AND SYSTEM FOR IMPROVED COMMUNICATION SECURITY - Security is improved in a communication system in which a communication connection is established when a user who has received a software button on his computing device (a Recipient) clicks on the button. When a Recipient first actuates a software button, a basic type of communication connection is established, during which the Recipient's identity can be verified. The Recipient then establishes a personal identification code, which he will have to provide upon future actuations of the software button. The system then enables other types of communication connections to be established by the Recipient. After the Recipient actuates the software button and verifies his identity, the system remembers the identity and location of the computing device he is using. When the Recipient subsequently actuates the software button, the identity and location of his computing device are checked, and verification of his identity is suppressed if they have not changed. | 11-10-2011 |
20130058469 | PERSONAL ALLOWED NUMBER SYSTEM - A system and method for preventing or facilitating communications between individuals who reside in detention environments (such as e.g., prisons or correctional facilities) and individuals who are not in such detention environments using an automated authentication or verification. | 03-07-2013 |
20130182832 | USER-BASED AUTHENTICATION FOR REALTIME COMMUNICATIONS - Architecture for a communications system enabling a user to provision a telephone at a new location without network administrative pre-configuring. An input component (e.g., keypad) receives a numeric extension and PIN. The extension is a telephone extension of the user and the PIN can be administratively assigned. A location component provides location information of an enterprise communications server to the telephone based on the extension. The telephone uses the location information to send messages to the enterprise communications server. A registration component registers the telephone with the enterprise communications server based on the numeric extension. A telephony address is returned to the telephone. An authentication component authenticates the telephone based on the PIN. Upon authentication, the extension is assigned to the telephone, and telephone communications can be sent and received from that location. | 07-18-2013 |